Proceedings of the 35th Annual Computer Security Applications Conference 2019
DOI: 10.1145/3359789.3359842
|View full text |Cite
|
Sign up to set email alerts
|

Privacy preserving substring search protocol with polylogarithmic communication cost

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 9 publications
(14 citation statements)
references
References 25 publications
0
14
0
Order By: Relevance
“…These attacks pushed for the availability of efficient PPSS protocols avoiding this information leakage. In many of the existing solutions [22,27,42,48] the low leakage comes at the cost of making the computation cost on server side linear in the document collection size. The PPSS protocol described in [30] allows to reduce such cost to polylogarithmic; however, it requires O(m+o q ) communication rounds and a polylogarithmic bandwidth cost.…”
Section: Oram Protocolsmentioning
confidence: 99%
See 1 more Smart Citation
“…These attacks pushed for the availability of efficient PPSS protocols avoiding this information leakage. In many of the existing solutions [22,27,42,48] the low leakage comes at the cost of making the computation cost on server side linear in the document collection size. The PPSS protocol described in [30] allows to reduce such cost to polylogarithmic; however, it requires O(m+o q ) communication rounds and a polylogarithmic bandwidth cost.…”
Section: Oram Protocolsmentioning
confidence: 99%
“…We provide an operative description of the backward search algorithm in Alg. 1, pointing the reader interested in the detailed correctness analysis to [14,27]. Backward Search in a Document Collection.…”
Section: Backward Search Algorithmmentioning
confidence: 99%
“…However, its query time is relatively large. Later, Mainardi et al [22] optimizes the query algorithm in [20] to achieve (| | + ) at the cost of higher index space, i.e., (|Σ|⋅ ), where |Σ| is the number of distinct characters in the dictionary. Although authors in this article considered datasets with small |Σ| (e.g., DNA dataset), the |Σ| can be large in practice.…”
Section: Related Workmentioning
confidence: 99%
“…In contrast, [20] utilizes Burrows-Wheeler Transformation (BWT) to build a suffix array index to support substring query, which has better storage-efficiency than the suffix tree at the cost of worse query-efficiency. Later, based on the scheme in [20] , [22] uses Private Information Retrieval (PIR) technique to protect the access pattern, which causes high index space and query time. In addition to suffix tree and suffix array, there are other auxiliary data structures [15,23] can be used to support substring query.…”
Section: Theoretical Analysismentioning
confidence: 99%
See 1 more Smart Citation